FEEDBACK Smiley face

Your search returned 1008 results. Subscribe to this search

|
1. Security engineering : a guide to building dependable distributed systems

by Anderson, Ross.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : Wiley, c2008Online access: Publisher description | Table of contents only Availability: Items available for loan: IIITD [005.8 AND-S] (3).
Items available for reference: IIITD [REF 005.8 AND-S] (1).
Checked out (1).
  (1 votes)
2. Security and usability : designing secure systems that people can use

by Cranor, Lorrie Faith | Garfinkel, Simson.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastapol, CA : O'Reilly, ©2005Online access: Table of contents | Publisher description Availability:
Items available for reference: IIITD [REF 005.8 CRA-S] (1).

3. Scene of cybercrime

by Shinder, Debra Littlejohn | Cross, Michael.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Burlington : Syngress, c2008Availability:
Items available for reference: IIITD [REF 005.8 SHI-S] (1).

4. Phishing and countermeasures : understanding the increasing problem of electronic identity theft

by Jakobsson, Markus | Myers, Steven 1975-.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hoboken, N.J. : Wiley, c2007Online access: Table of contents only | Publisher description | Contributor biographical information Availability:
Items available for reference: IIITD [REF 005.8 JAK-P] (1).

5. Crimeware : understanding new attacks and defenses

by Jakobsson, Markus | Ramzan, Zulfikar.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2008Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 JAK-C] (1).

6. Introduction to computer security

by Bishop, Matt (Matthew A.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Addison-Wesley, c2005Online access: Table of contents Availability:
Items available for reference: IIITD [REF 005.8 BIS-I] (1).

7. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Springer, ©2003Online access: Publisher description | Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 PIE-F] (1). Checked out (1).

8. Microsoft encyclopedia of security

by Tulloch, Mitch.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Redmond, Wash. : Microsoft Press, 2003Online access: Contributor biographical information | Publisher description Availability:
Items available for reference: IIITD [REF 005.803 TUL-M] (1).

9. Computer forensics and cyber crime : an introduction

by Britz, Marjie.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson, ©2009Online access: Table of contents only Availability:
Items available for reference: IIITD [REF 005.8 BRI-C] (1).

10. Investigative data mining for security and criminal detection

by Mena, Jesus.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam ; Boston, MA : Butterworth-Heinemann, 2003Online access: Publisher description | Table of contents Availability: No items available
Withdrawn (1).

11. Core security patterns : best practices and strategies for J2EE, web services, and identity management

by Steel, Christopher 1968- | Nagappan, Ramesh | Lai, Ray.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Prentice Hall, c2006Online access: Table of contents Availability: Items available for loan: IIITD [005.8 STE-C] (1).

12. Network security essentials : applications and standards

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, NJ : Pearson Education, c2007Online access: Table of contents only Availability: Items available for loan: IIITD [005.8 STA-N] (1).

13. Secure coding : principles and practices

by Graff, Mark G | Van Wyk, Kenneth R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New Delhi : SPD, 2003Availability: Items available for loan: IIITD [005.8 GRA-S] (4).
Items available for reference: IIITD [REF 005.8 GRA-S] (1).

14. Introduction to computer security

by Bishop, Matt.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Pearson, ©2006Online access: Table of contents Availability: Items available for loan: IIITD [005.8 BIS-I] (5).
Items available for reference: IIITD [REF 005.8 BIS-I] (1).
Checked out (3).

15. Web hacking attack and defense

by McClure, Stuart | Shah, Saumil | Shah, Shreeraj.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Pearson, 2009Availability: Items available for loan: IIITD [005.8 MCC-W] (1).

16. Applied cryptography : protocols, algorithms, and source code in C

by Schneier, Bruce.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, ©2001Online access: Contributor biographical information | Publisher description | Table of Contents Availability: Items available for loan: IIITD [005.82 SCH-A] (5).
Items available for reference: IIITD [REF 005.82 SCH-A] (1).
  (1 votes)
17. Introduction to modern cryptography

by Katz, Jonathan 1974- | Lindell, Yehuda.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Chapman & Hall/CRC, c2008Online access: Table of contents only | Publisher description Availability: Items available for loan: IIITD [005.82 KAT-I] (1).
Items available for reference: IIITD [REF 005.82 KAT-I] (1).

18. Digital watermarking and steganography

by Cox, Ingemar J | Miller, Matthew L | Bloom, Jeffrey A | Fridrich, Jessica | Kalker, Ton.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam ; Boston : Morgan Kaufmann, ©2008Online access: Table of contents only | Publisher description Availability: Items available for loan: IIITD [005.8 COX-D] (1).
Items available for reference: IIITD [REF 005.8 COX-D] (1).

19. Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors.

by Katzenbeisser, Stefan | Petitcolas, Fabien A. P.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Artech House, 2000Availability: Items available for loan: IIITD [REF 005.8 KAT-I] (1).

20. Pervasive information security and privacy developments : trends and advancements

by Nemati, Hamid R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: IIITD [REF 005.8 NEM-P] (1).


© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in